Sciweavers

133 search results - page 20 / 27
» Computer-Related Risk Futures
Sort
View
ISCAS
2006
IEEE
112views Hardware» more  ISCAS 2006»
14 years 1 months ago
Towards an optimised VLSI design algorithm for the constant matrix multiplication problem
The efficient design of multiplierless implementa- The goal is to find the optimal sub-expressions across all N dot tions of constant matrix multipliers is challenged by the huge p...
Andrew Kinane, Valentin Muresan, Noel E. O'Connor
IMA
2005
Springer
162views Cryptology» more  IMA 2005»
14 years 1 months ago
Pairing-Based Cryptography at High Security Levels
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solutio...
Neal Koblitz, Alfred Menezes
ICSM
2003
IEEE
14 years 24 days ago
Software Systems Integration and Architectural Analysis - A Case Study
Software systems no longer evolve as separate entities but are also integrated with each other. The purpose of integrating software systems can be to increase user-value or to dec...
Rikard Land, Ivica Crnkovic
ACG
2003
Springer
14 years 23 days ago
Opponent-Model Search in Bao: Conditions for a Successful Application
Abstract Opponent-Model search is a game-tree search method that explicitly uses knowledge of the opponent. There is some risk involved in using Opponent-Model search. Both the pre...
H. H. L. M. Donkers, H. Jaap van den Herik, Jos W....
ICECCS
1999
IEEE
83views Hardware» more  ICECCS 1999»
13 years 12 months ago
A Framework for Analyzing Configurations of Deployable Software Systems
Configuring and deploying a large software system is complicated when the system is composed of components and when there are numerous possible configurations for the system. In s...
Dennis Heimbigner, Richard S. Hall, Alexander L. W...